Gibson> Download Garbage
Ctrlk
  • Statement of purpose
  • Techniques
    • Intelligence Gathering
    • Initial Access
    • Execution
    • Privilege Escalation
    • Defense Evasion
    • Credential Access
      • Extract credentials from LSASS dump
      • Extract credentials from registry hives
      • LSA secrets extraction
      • Dumping LSASS.exe
      • Dumping registry hives
      • Dump the domain (Domain Controllers)
      • Browser cookies & passwords
      • Wi-Fi passwords
      • Clipboard
    • Infrastructure
    • Web application testing
    • Other
    • Red Team Infrastructure
    • Malware
    • Automation
  • Tools
    • Tools
Powered by GitBook
On this page
  1. Techniques

Credential Access

Extract credentials from LSASS dumpExtract credentials from registry hivesLSA secrets extractionDumping LSASS.exeDumping registry hivesDump the domain (Domain Controllers)Browser cookies & passwordsWi-Fi passwordsClipboard
PreviousMicrosoft Windows DefenderNextExtract credentials from LSASS dump

Last updated 5 years ago

Was this helpful?

Was this helpful?